A false flag operation is an act committed with the intent of disguising the actual source of responsibility and pinning blame on another party. The term "false flag" originated in the 16th century as an expression meaning an intentional misrepresentation of someone's allegiance. [1] [2] The term was originally used to describe a ruse in naval warfare whereby a vessel flew the flag of a neutral or enemy country in order to hide its true identity. [1] [2] [3] The tactic was initially used by pirates and privateers to deceive other ships into allowing them to move closer before attacking them. It later was deemed an acceptable practice during naval warfare according to international maritime laws, provided the attacking vessel displayed its true flag before commencing an attack. [4] [5] [6]
The term today extends to include countries that organize attacks on themselves and make the attacks appear to be by enemy nations or terrorists, thus giving the nation that was supposedly attacked a pretext for domestic repression or foreign military aggression. [7] Similarly deceptive activities carried out during peacetime by individuals or nongovernmental organizations have been called false flag operations, but the more common legal term is a "frameup", "stitch up", or "setup".
In land warfare, such operations are generally deemed acceptable under certain circumstances, such as to deceive enemies, provided the deception is not perfidious and that all such deceptions are discarded before opening fire upon the enemy. Similarly, in naval warfare such a deception is considered permissible, provided the false flag is lowered and the true flag raised before engaging in battle. [8] Auxiliary cruisers operated in such a fashion in both World Wars, as did Q-ships, while merchant vessels were encouraged to use false flags for protection. Such masquerades promoted confusion not just of the enemy but of historical accounts. In 1914 the Battle of Trindade was fought between the British auxiliary cruiser RMS Carmania and the German auxiliary cruiser SMS Cap Trafalgar, which had been altered to look like Carmania. (Contrary to some accounts, the Carmania had not been altered to resemble the Cap Trafalgar.)
Another notable example was the World War II German commerce raider Kormoran, which surprised and sank the Australian light cruiser HMAS Sydney in 1941 while disguised as a Dutch merchant ship, causing the greatest loss of life on an Australian warship. While Kormoran was fatally damaged in the engagement and its crew captured, the outcome represented a considerable psychological victory for the Germans. [9]
The British used a Kriegsmarine ensign in the St Nazaire Raid and captured a German code book. The old destroyer Campbeltown, which the British planned to sacrifice in the operation, was provided with cosmetic modifications that involved cutting the ship's funnels and chamfering the edges to resemble a German Type 23 torpedo boat. By this ruse the British were able to get within two miles (3 km) of the harbour before the defences responded, where the explosive-rigged Campbeltown and commandos successfully disabled or destroyed the key dock structures of the port. [10] [11]
Between December 1922 and February 1923, a commission of jurists at the Hague drafted a set of rules concerning the Control of Wireless Telegraphy in Time of War and Air Warfare. They included: [12]
- Art. 3. A military aircraft must carry an exterior mark indicating its nationality and its military character.
- Art. 19. The use of false exterior marks is forbidden.
This draft was never adopted as a legally binding treaty, but the International Committee of the Red Cross states in its introduction on the draft: "To a great extent, [the draft rules] correspond to the customary rules and general principles underlying treaties on the law of war on land and at sea", [13] and as such these two non-controversial articles were already part of customary law. [14]
In land warfare, the use of a false flag is similar to that of naval warfare: the trial of Otto Skorzeny, who planned and commanded Operation Greif, by a U.S. military tribunal at the Dachau Trials included a finding that Skorzeny was not guilty of a crime by ordering his men into action in American uniforms. He had relayed to his men the warning of German legal experts: if they fought in American uniforms, they would be breaking the laws of war; however, they probably were not doing so simply by wearing the American uniforms. During the trial, a number of arguments were advanced to substantiate this position and the German and U.S. military seem to have been in agreement.
In the transcript of the trial, [15] it is mentioned that Paragraph 43 of the Field Manual published by the War Department, United States Army, on 1 October 1940, under the entry Rules of Land Warfare states: "National flags, insignias and uniforms as a ruse –in practice it has been authorized to make use of these as a ruse. The foregoing rule (Article 23 of the Annex of the IV Hague Convention), does not prohibit such use, but does prohibit their improper use. It is certainly forbidden to make use of them during a combat. Before opening fire upon the enemy, they must be discarded."
In 1788, the head tailor at the Royal Swedish Opera received an order to sew a number of Russian military uniforms. These were then used by Swedes to stage an attack on Puumala, a Swedish outpost on the Russo-Swedish border, on 27 June 1788. This caused an outrage in Stockholm and impressed the Riksdag of the Estates, the Swedish national assembly, who until then had refused to agree to an offensive war against Russia. The Puumala incident allowed King Gustav III of Sweden, who lacked the constitutional authority to initiate unprovoked hostilities without the Estates' consent, to launch the Russo-Swedish War (1788–1790). [16]
On July 13, 1870, Otto von Bismarck published the Ems Dispatch, an internal message from King Wilhelm I to Bismarck regarding certain demands made by the French ambassador. In the version purposefully released to the public, Bismarck instead made it sound like the King had gravely disrespected the ambassador – a ploy to trick Emperor Napoleon III into declaring war on the North German Confederation, with the end goal of unifying the northern and southern German states. This ploy would be successful, as Napoleon III would declare war six days later; and six months later, the Confederation would win and unify the German states.
In September 1931, Seishirō Itagaki and other Japanese mid- to junior-grade officers, without the knowledge of the Tokyo government, fabricated a pretext for invading Manchuria by blowing up a section of railway. Though the explosion was too weak to disrupt operations on the rail line, the Japanese nevertheless used the Mukden incident to seize Manchuria and create a puppet government in the form of the nominally independent state of Manchukuo. [17]
The Gleiwitz incident in 1939 involved Reinhard Heydrich fabricating evidence of a Polish attack against Germany to mobilize German public opinion for war and to justify the war with Poland. Alfred Naujocks was a key organiser of the operation under orders from Heydrich. It led to the deaths of Nazi concentration camp victims who were dressed as German soldiers and then shot by the Gestapo to make it seem that they had been shot by Polish soldiers. This, along with other false flag operations in Operation Himmler, would be used to mobilize support from the German population for the start of World War II in Europe. [18]
The operation failed to convince international public opinion of the German claims, and both Britain and France –Poland's allies –declared war two days after Germany invaded Poland. [19]
On 26 November 1939, the Soviet army shelled Mainila, a Russian village near the Finnish border. Soviet authorities blamed Finland for the attack and used the incident as a pretext to invade Finland, starting the Winter War, four days later. [20] [21]
Operation Northwoods, a 1962 plot proposed but never executed by the U.S. Department of Defense for a war with Cuba, involved scenarios such as fabricating the hijacking or shooting down of passenger and military planes, sinking a U.S. ship in the vicinity of Cuba, burning crops, sinking a boat filled with Cuban refugees, attacks by alleged Cuban infiltrators inside the United States, and harassment of U.S. aircraft and shipping and the destruction of aerial drones by aircraft disguised as Cuban MiGs. [22] These actions would be blamed on Cuba, and would be a pretext for an invasion of Cuba and the overthrow of Fidel Castro's communist government. It was authorised by the Joint Chiefs of Staff, but then rejected by President John F. Kennedy. The surprise discovery of the documents relating to Operation Northwoods was a result of the comprehensive search for records related to the assassination of President John F. Kennedy by the Assassination Records Review Board in the mid-1990s. [23] Information about Operation Northwoods was later publicized by James Bamford. [24]
In January and February 2022, Western government agencies predicted that Russia would use a false flag operation in Ukraine. [25] In the days leading up to the Russian invasion of Ukraine on 24 February, the Russian government intensified its disinformation campaign, with Russian state media promoting false flags on a nearly hourly basis purporting to show Ukrainian forces attacking Russia, in a bid to justify an invasion of Ukraine. [26] [27] Many of the disinformation videos were poor and amateur in quality, with mismatching metadata showing incorrect dates, [27] and evidence from Bellingcat researchers, and other independent journalists, showed that the claimed attacks, explosions, and evacuations in Donbas were staged by Russia. [26] [27] [28] [29] [30]
On 4 April 1953, the CIA was ordered to undermine the government of Iran over a four-month period, as a precursor to overthrowing Prime Minister Mohammad Mosaddegh. One tactic used to undermine Mosaddegh was to carry out false flag attacks "on mosques and key public figures", to be blamed on Iranian communists loyal to the government. [31]
The CIA operation was code-named TPAJAX. The tactic of a "directed campaign of bombings by Iranians posing as members of the Communist party" involved the bombing of "at least one" well known Muslim's house by CIA agents posing as Communists. [32] The CIA determined that the tactic of false flag attacks added to the "positive outcome" of TPAJAX. [31]
However, as "the C.I.A. burned nearly all of its files on its role in the 1953 coup in Iran", the true extent of the tactic has been difficult for historians to discern. [33]
In the summer of 1954, a group of Egyptian Jews recruited by Israeli army intelligence were caught with plans to bomb American, British, and Egyptian civil targets in Egypt. The bombs were timed to detonate several hours after closing time. The bombings were to be blamed on the Muslim Brotherhood, Egyptian Communists, "unspecified malcontents", or "local nationalists", with the aim of creating a climate of sufficient violence and instability to induce the British government to refrain from evacuating its troops occupying Egypt's Suez Canal zone, a move that would embolden Egyptian President Nasser against Israel. However, the plot was exposed before launch and Egyptian authorities were able to tail an operative to his target, arrest him and later search his apartment where the entire plan, including the names of other agents and explosive materials, was held. Unknown to Israel Prime Minister Moshe Sharet, the exposé caused a scandal in Israel, with Israeli officials blaming one another for the operation and the Israeli defense minister, Pinhas Lavon, resigning under pressure. Later, two investigative committees found that Lavon was unaware of the operation. [34] [35] [36]
Due to its deceptive nature a false flag operation can fail in such a manner as to implicate the perpetrator rather than the intended victim.
A notable example is an April 2022 FSB operation where would-be Ukrainian assassins of Russian propagandist Vladimir Solovyov were filmed while being arrested. The footage published by the FSB was however found to implicate the FSB as having staged the arrest. Together with weapons, drugs, Ukrainian passports and Nazi memorabilia the footage also prominently showed three expansion packs for the Sims 3 video game. Investigative journalist Eliot Higgins interpreted this to mean that the arrest was in fact staged, with its organizers misunderstanding an instruction "to get 3 SIMs". Further lending credence to the arrest being staged was footage of a note with a Russian phrase, which in fact read signature unclear. This was again interpreted as a misunderstood instruction, this time taken too literally. The FSB subsequently published a version of the footage with the Sims games blurred out. [37] [38] [39]
Pseudo-operations are those in which forces of one power disguise themselves as enemy forces. For example, a state power may disguise teams of operatives as insurgents and, with the aid of defectors, infiltrate insurgent areas. [40] The aim of such pseudo-operations may be to gather short or long-term intelligence or to engage in active operations, in particular assassinations of important enemies. However, they usually involve both, as the risks of exposure rapidly increase with time and intelligence gathering eventually leads to violent confrontation. Pseudo-operations may be directed by military or police forces, or both. Police forces are usually best suited to intelligence tasks; however, military provide the structure needed to back up such pseudo-ops with military response forces. According to US military expert Lawrence Cline (2005), "the teams typically have been controlled by police services, but this largely was due to the weaknesses in the respective military intelligence systems." [41]
The State Political Directorate (OGPU) of the Soviet Union set up such an operation from 1921 to 1926. During Operation Trust, they used loose networks of White Army supporters and extended them, creating the pseudo-"Monarchist Union of Central Russia" (MUCR) in order to help the OGPU identify real monarchists and anti-Bolsheviks. [42]
An example of a successful assassination was United States Marine Sergeant Herman H. Hanneken leading a patrol of his Haitian Gendarmerie disguised as enemy guerrillas in 1919. The patrol successfully passed several enemy checkpoints in order to assassinate the guerilla leader Charlemagne Péralte near Grande-Rivière-du-Nord. Hanneken was awarded the Medal of Honor [43] and was commissioned a Second Lieutenant for his deed.[ citation needed ]
During the Mau Mau uprising in the 1950s, captured Mau Mau members who switched sides and specially trained British troops initiated the pseudo-gang concept to successfully counter Mau Mau. In 1960, Frank Kitson, who was later involved in the Northern Irish conflict and is now a retired British general, published Gangs and Counter-gangs, an account of his experiences with the technique in Kenya. Information included how to counter gangs and measures of deception, including the use of defectors, which brought the issue a wider audience.[ citation needed ]
Another example of combined police and military oversight of pseudo-operations include the Selous Scouts in the former country Rhodesia (now Zimbabwe), governed by white minority rule until 1980. The Selous Scouts were formed at the beginning of Operation Hurricane, in November 1973, by Major (later Lieutenant Colonel) Ronald Reid-Daly. As with all Special Forces in Rhodesia, by 1977 they were controlled by COMOPS (Commander, Combined Operations) Commander Lieutenant General Peter Walls. The Selous Scouts were originally composed of 120 members, with all officers being white and the highest rank initially available for black soldiers being colour sergeant. They succeeded in turning approximately 800 insurgents who were then paid by Special Branch, ultimately reaching the number of 1,500 members. Engaging mainly in long-range reconnaissance and surveillance missions, they increasingly turned to offensive actions, including the attempted assassination of Zimbabwe People's Revolutionary Army leader Joshua Nkomo in Zambia. This mission was finally aborted by the Selous Scouts, and attempted again, unsuccessfully, by the Rhodesian Special Air Service. [44]
Some offensive operations attracted international condemnation, in particular the Selous Scouts' raid on a Zimbabwe African National Liberation Army (ZANLA) camp at Nyadzonya Pungwe, Mozambique in August 1976. ZANLA was then led by Josiah Tongogara. Using Rhodesian trucks and armored cars disguised as Mozambique military vehicles, 84 scouts killed 1,284 people in the camp, registered as a refugee camp by the United Nations (UN). Even according to Reid-Daly, most of those killed were unarmed guerrillas standing in formation for a parade. The camp hospital was also set ablaze by the rounds fired by the Scouts, killing all patients. [45] According to David Martin and Phyllis Johnson, who visited the camp shortly before the raid, it was only a refugee camp that did not host any guerrillas. It was staged for UN approval. [46]
According to a 1978 study by the Directorate of Military Intelligence, 68% of all insurgent deaths inside Rhodesia could be attributed to the Selous Scouts, who were disbanded in 1980. [47]
If the action is a police action, then these tactics would fall within the laws of the state initiating the pseudo, but if such actions are taken in a civil war or during a belligerent military occupation then those who participate in such actions would not be privileged belligerents. The principle of plausible deniability is usually applied for pseudo-teams. (See the above section Laws of war). Some false flag operations have been described by Lawrence E. Cline, a retired US Army intelligence officer, as pseudo-operations, or "the use of organized teams which are disguised as guerrilla groups for long- or short-term penetration of insurgent-controlled areas". [40]
"Pseudo-operations should be distinguished," notes Cline, "from the more common police or intelligence infiltration of guerrilla or criminal organizations. In the latter case, infiltration is normally done by individuals. Pseudo teams, on the other hand, are formed as needed from organized units, usually military or paramilitary. The use of pseudo teams has been a hallmark of a number of foreign counterinsurgency campaigns." [40]
Similar false flag tactics were also employed during the Algerian civil war, starting in the middle of 1994. Death squads composed of Département du Renseignement et de la Sécurité (DRS) security forces disguised themselves as Islamist terrorists and committed false flag terror attacks. Such groups included the Organisation of Young Free Algerians (OJAL) or the Secret Organisation for the Safeguard of the Algerian Republic (OSSRA). [48] According to Roger Faligot and Pascal Kropp (1999), the OJAL was reminiscent of "the Organization of the French Algerian Resistance (ORAF), a group of counter-terrorists created in December 1956 by the Direction de la surveillance du territoire (Territorial Surveillance Directorate, or DST) whose mission was to carry out terrorist attacks with the aim of quashing any hopes of political compromise". [49]
In espionage, the term "false flag" describes the recruiting of agents by operatives posing as representatives of a cause the prospective agents are sympathetic to, or even the agents' own government. For example, during the Cold War, several female West German civil servants were tricked into stealing classified documents by agents of the East German Stasi intelligence service pretending to be members of West German peace advocacy groups (the Stasi agents were also described as "Romeos", indicating that they also used their sex appeal to manipulate their targets, making this operation a combination of the false flag and "honey trap" techniques). [50]
According to ex-KGB defector Jack Barsky, "Many a right-wing radical had given information to the Soviets under a 'false flag', thinking they were working with a Western ally, such as Israel, when in fact their contact was a KGB operative." [51]
The term is popular amongst conspiracy theory promoters in referring to covert operations of various governments and claimed cabals. [52] According to Columbia Journalism Review , this usage mostly "migrated to the right", however because some historical false flag incidents occurred, historians should not fully cede the usage of the term to conspiracy theorists. Perlman says "The real danger is if we use the nonattributive 'false flags' as shorthand for conspiracy theories, without explaining what they are and who is promoting them." At the same time, Perlman writes that "people yelling that any attack attributed to someone on 'their side' was committed by 'the other side' drown out the voices of reason." [2]
Political campaigning has a long history of this tactic in various forms, including in person, print media and electronically in recent years. This can involve when supporters of one candidate pose as supporters of another, or act as "straw men" for their preferred candidate to debate against. This can happen with or without the candidate's knowledge. The Canuck letter is an example of one candidate's creating a false document and attributing it as coming from another candidate in order to discredit that candidate.[ citation needed ]
In 2006, individuals practicing false flag behavior were discovered and "outed" in New Hampshire [53] [54] and New Jersey [55] after blog comments claiming to be from supporters of a political candidate were traced to the IP address of paid staffers for that candidate's opponent.
On 19 February 2011, Indiana Deputy Prosecutor Carlos Lam sent a private email to Wisconsin Governor Scott Walker suggesting that he run a "'false flag' operation" to counter the protests against Walker's proposed restrictions on public employees' collective bargaining rights:
If you could employ an associate who pretends to be sympathetic to the unions' cause to physically attack you (or even use a firearm against you), you could discredit the unions ... Employing a false flag operation would assist in undercutting any support the media may be creating in favor of the unions. [56] [57]
The press had acquired a court order to access all of Walker's emails and Lam's email was exposed. At first, Lam vehemently denied it, but eventually admitted it and resigned. [57]
Some conservative commentators suggested that pipe bombs that were sent to prominent Democrats prior to the 2018 mid-term elections were part of a false flag effort to discredit Republicans and supporters of then-President Donald Trump. [58] Cesar Sayoc, motivated by his belief that Democrats were “evil”, was later convicted of mailing the devices to Trump's critics. [59]
On the internet, a concern troll is a false flag pseudonym created by a user whose actual point of view is opposed to the one that the troll claims to hold. The concern troll posts in web forums devoted to its declared point of view and attempts to sway the group's actions or opinions while claiming to share their goals, but with professed "concerns". The goal is to sow fear, uncertainty, and doubt within the group often by appealing to outrage culture. [60] This is a particular case of sockpuppeting and safe-baiting.
Proponents of political or religious ideologies will sometimes use false flag tactics. This can be done to discredit or implicate rival groups, create the appearance of enemies when none exist, or create the illusion of organized and directed persecution. This can be used to gain attention and sympathy from outsiders, in particular the media, or to convince others within the group that their beliefs are under attack and in need of protection.
In retaliation for writing The Scandal of Scientology , some members of the Church of Scientology stole stationery from author Paulette Cooper's home and then used that stationery to forge bomb threats and have them mailed to a Scientology office. The Guardian's Office also had a plan for further operations to discredit Cooper known as Operation Freakout, but several Scientology operatives were arrested in a separate investigation and the plan was exposed. [61]
According to PolitiFact , some false flag conspiracy theories (such as claims that mass shootings are hoaxes) are themselves spread by astroturfing, which is an attempt to create false impression of popularity in a belief. [62]
Espionage, spying, or intelligence gathering is the act of obtaining secret or confidential information (intelligence). A person who commits espionage is called an espionage agent or spy. Any individual or spy ring, in the service of a government, company, criminal organization, or independent operation, can commit espionage. The practice is clandestine, as it is by definition unwelcome. In some circumstances, it may be a legal tool of law enforcement and in others, it may be illegal and punishable by law.
Otto Johann Anton Skorzeny was an Austrian-born German SS-Obersturmbannführer in the Waffen-SS during World War II. During the war, he was involved in a number of operations, including the removal from power of Hungarian Regent Miklós Horthy and the Gran Sasso raid which rescued Benito Mussolini from captivity. Skorzeny led Operation Greif in which German soldiers infiltrated Allied lines wearing their enemies' uniforms. As a result, he was charged in 1947 at the Dachau Military Tribunal with breaching the 1907 Hague Convention, but was acquitted.
Electromagnetic warfare or electronic warfare (EW) is warfare involving the use of the electromagnetic spectrum or directed energy to control the spectrum, attack an enemy, or impede enemy operations. The purpose of electromagnetic warfare is to deny the opponent the advantage of—and ensure friendly unimpeded access to—the EM spectrum. Electromagnetic warfare can be applied from air, sea, land, or space by crewed and uncrewed systems, and can target communication, radar, or other military and civilian assets.
Information warfare (IW) is the battlespace use and management of information and communication technology (ICT) in pursuit of a competitive advantage over an opponent. It is different from cyberwarfare that attacks computers, software, and command control systems. Information warfare is the manipulation of information trusted by a target without the target's awareness so that the target will make decisions against their interest but in the interest of the one conducting information warfare. As a result, it is not clear when information warfare begins, ends, and how strong or destructive it is.
Psychological warfare (PSYWAR), or the basic aspects of modern psychological operations (PsyOp), has been known by many other names or terms, including Military Information Support Operations (MISO), Psy Ops, political warfare, "Hearts and Minds", and propaganda. The term is used "to denote any action which is practiced mainly by psychological methods with the aim of evoking a planned psychological reaction in other people".
A car bomb, bus bomb, van bomb, lorry bomb, or truck bomb, also known as a vehicle-borne improvised explosive device (VBIED), is an improvised explosive device designed to be detonated in an automobile or other vehicles.
A casus belli is an act or an event that either provokes or is used to justify a war. A casus belli involves direct offenses or threats against the nation declaring the war, whereas a casus foederis involves offenses or threats against its ally—usually one bound by a mutual defense pact. Either may be considered an act of war. A declaration of war usually contains a description of the casus belli that has led the party in question to declare war on another party.
Seymour Myron Hersh is an American investigative journalist and political writer. He gained recognition in 1969 for exposing the My Lai massacre and its cover-up during the Vietnam War, for which he received the 1970 Pulitzer Prize for International Reporting. During the 1970s, Hersh covered the Watergate scandal for The New York Times, also reporting on the secret U.S. bombing of Cambodia and the Central Intelligence Agency's (CIA) program of domestic spying. In 2004, he detailed the U.S. military's torture and abuse of prisoners at Abu Ghraib in Iraq for The New Yorker. Hersh has won five George Polk Awards, and two National Magazine Awards. He is the author of 11 books, including The Price of Power: Kissinger in the Nixon White House (1983), an account of the career of Henry Kissinger which won the National Book Critics Circle Award.
The Selous Scouts was a special forces unit of the Rhodesian Army that operated during the Rhodesian Bush War from 1973 until the reconstitution of the country as Zimbabwe in 1980. It was mainly responsible for infiltrating the black majority population of Rhodesia and collecting intelligence on insurgents so that they could be attacked by regular elements of the security forces. The unit did this by forming small teams that posed as insurgents and usually included captured insurgents. Over time, the Selous Scouts increasingly attacked insurgents themselves and operated in the countries that neighbored Rhodesia.
Active measures is a term used to describe political warfare conducted by the Soviet Union and the Russian Federation. The term, which dates back to the 1920s, includes operations such as espionage, propaganda, sabotage and assassination, based on foreign policy objectives of the Soviet and Russian governments. Active measures have continued to be used by the administration of Vladimir Putin.
The First Main Directorateof the Committee for State Security under the USSR council of ministers was the organization responsible for foreign operations and intelligence activities by providing for the training and management of covert agents, intelligence collection administration, and the acquisition of foreign and domestic political, scientific and technical intelligence for the Soviet Union.
Maneuver warfare, or manoeuvre warfare, is a military strategy which emphasizes movement, initiative and surprise to achieve a position of advantage. Maneuver seeks to inflict losses indirectly by envelopment, encirclement and disruption, while minimizing the need to engage in frontal combat. In contrast to attrition warfare where strength tends to be applied against strength, maneuver warfare attempts to apply strength against weakness in order to accomplish the mission.
Irregular military is any non-standard military component that is distinct from a country's national armed forces. Being defined by exclusion, there is significant variance in what comes under the term. It can refer to the type of military organization, or to the type of tactics used. An irregular military organization is one which is not part of the regular army organization. Without standard military unit organization, various more general names are often used; such organizations may be called a troop, group, unit, column, band, or force. Irregulars are soldiers or warriors that are members of these organizations, or are members of special military units that employ irregular military tactics. This also applies to irregular infantry and irregular cavalry units.
Military deception (MILDEC) is an attempt by a military unit to gain an advantage during warfare by misleading adversary decision makers into taking action or inaction that creates favorable conditions for the deceiving force. This is usually achieved by creating or amplifying an artificial fog of war via psychological operations, information warfare, visual deception, or other methods. As a form of disinformation, it overlaps with psychological warfare. Military deception is also closely connected to operations security (OPSEC) in that OPSEC attempts to conceal from the adversary critical information about an organization's capabilities, activities, limitations, and intentions, or provide a plausible alternate explanation for the details the adversary can observe, while deception reveals false information in an effort to mislead the adversary.
In the context of war, perfidy is a form of deception in which one side promises to act in good faith with the intention of breaking that promise once the unsuspecting enemy is exposed.
The Rhodesian Air Force (RhAF) was an air force based in Salisbury which represented several entities under various names between 1935 and 1980: originally serving the British self-governing colony of Southern Rhodesia, it was the air arm of the Federation of Rhodesia and Nyasaland between 1953 and 31 December 1963; of Southern Rhodesia once again from 1 January 1964; and of the unrecognised nation of Rhodesia following its Unilateral Declaration of Independence from Britain on 11 November 1965.
Russian military deception, sometimes known as maskirovka, is a military doctrine developed from the start of the 20th century. The doctrine covers a broad range of measures for military deception, from camouflage to denial and deception.
The Institute for Intelligence and Special Operations, popularly known as Mossad, is the national intelligence agency of the State of Israel. It is one of the main entities in the Israeli Intelligence Community, along with Aman and Shin Bet.
Targeted killing is a form of assassination carried out by governments outside a judicial procedure or a battlefield.
Kyrylo Oleksiiovych Budanov is a Ukrainian military leader who has served as the chief of the Main Directorate of Intelligence of the Ministry of Defense of Ukraine since August 2020. Budanov previously served as the deputy director of one of the departments of the Foreign Intelligence Service of Ukraine. He holds the rank of lieutenant general.
{{cite book}}
: CS1 maint: location missing publisher (link)